2009
DOI: 10.7763/ijcee.2009.v1.100
|View full text |Cite
|
Sign up to set email alerts
|

New Technique of Hidden Data in PE-File with in Unused Area One

Abstract: Aos Alaa Zaidan -He obtained his 1st Class Bachelor degree in Computer Engineering from university of Technology / Baghdad followed by master in data communication and computer network from University of Malaya. He led or member for many funded research projects and He has published more than 40 papers at various international and national conferences and journals, he has done many projects on Steganography for data hidden through different multimedia carriers image, video, audio, text, and non multimedia carr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…Steganography and cryptology are similar in the way that they both are used to protect important information [1]. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Steganography and cryptology are similar in the way that they both are used to protect important information [1]. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all.…”
Section: Introductionmentioning
confidence: 99%
“…A secret bit, mi is inserted into the ith block by placing "1" in to Bi if mi=1.Otherwise, the block is not changed in the embedding process. The detection of a specific bit is done via a test function which distinguishes modified block from unmodified block (1) [1], [8]: (2) The function f can be interpreted as a hypothesis-test function and the test of null-hypothesis "block Bi was not modified "against the alternative hypothesis "block Bi was modified." Therefore, the whole class of such steganography systems statistical steganography .the receiver successively applies f to alaa cover-block Bi in order to restore every bit of the secret message.…”
Section: Statistical Steganography Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…There are two types of malware detection techniques according to how code is analyzed [1][2][3][4][5][6][8][9][10][11]: First, static analysis identifies malicious code by unpacking and disassembling (or decompiling) the application [1][2][3]. The most important defense methods against malicious code are virus scanners.…”
Section: Introductionmentioning
confidence: 99%